02-15-2017 02:06 PM - edited 03-05-2019 08:02 AM
I am trying to design a way to use one router to terminate VPN connections, and for security reasons, keep traffic separate. So one internal interface is in vrf trusted, where I want to terminate a host of VPNs, and the other interface is in vrf untrusted, where I want to terminate other VPN's. The Public side would not be in a vrf.
Is this possible, and is there an example of what the VPN configuration would look like? It would be standard L2L IPSec VPN. I already have the vrf configured with separate routing tables BGP and OSPF.
02-15-2017 02:58 PM
I like to use ISAKMP profiles for this.
crypto keyring kr-dsto
pre-shared-key address ...
crypto isakmp profile isakmp-client1
vrf client1
keyring kr-client1
match identify address ...
local-address ...
crypto map-cryptomap 113 ipsec-isakmp
set isakmp-profile isakmp-client1
...
02-16-2017 08:09 AM
Actually its IPSec encrypted GRE tunnels. So if I create a tunnel interface in a vrf, and source the external non-vrf interface IP, will it work?
02-16-2017 10:42 AM
Are we talking about modern VTI tunnels, that use the "tunnel protection" command?
02-16-2017 12:10 PM
Just normal GRE over IPSec.
interface Tunnel64
ip vrf forwarding Inside
ip address 169.254.169.254 255.255.255.254
tunnel source 1.2.3.4
tunnel destination 4.3.2.1
Tunnel source is the outside interface of the router which is not associated with any vrf.
02-16-2017 12:12 PM
Yes, I believe that would work.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide